Managing Dependency Hygiene
Overview
The OpenSSF Scorecard is a security health assessment tool developed by the Open Source Security Foundation (OpenSSF). It automatically evaluates open source projects against a set of well-defined security best practices. The Scorecard outputs a score between 0 and 10, providing insights into how secure and trustworthy a project is based on its development practices.
At Heeler, we integrate the Scorecard to help you assess the security posture of your open source dependencies, enabling faster and more informed decisions around risk acceptance, policy enforcement, and remediation.
Why It Matters
Open source software is foundational to modern applications, but not all projects follow the same security standards. The Scorecard helps answer critical questions:
Is this dependency actively maintained?
Are vulnerabilities being addressed in a timely manner?
Are development practices aligned with modern security expectations?
By incorporating Scorecard scores, Heeler enables you to:
Detect high-risk dependencies early.
Set automated guardrails (e.g., warn or block based on score thresholds).
Track improvement (or decay) in dependency posture over time.
Prioritize remediation based on objective signals, not just CVEs.
Background on the Scorecard
The Scorecard evaluates projects across more than 20 security checks, including:
Check
What It Measures
CI Tests
Is there automated testing in place?
Maintained
Is the project actively maintained?
Security Policy
Is there a documented security policy?
Signed Releases
Are release artifacts cryptographically signed?
Dependency Updates
Are tools like Dependabot in use?
Vulnerabilities
Are known vulnerabilities being remediated quickly?
Token Permissions
Are GitHub tokens scoped minimally in workflows?
Each check contributes to the overall score, which is not a guarantee of security, but a proxy for security maturity.
Score Interpretation
Score Range
Interpretation
Typical Actions
0–3.9
High risk, missing core practices
Block or flag for manual review
4–6.9
Some good practices, but inconsistent
Monitor closely, validate key controls
7–8.9
Solid posture, mostly secure practices
Accept with caution, track updates
9–10
Strong adherence to best practices
Safe to trust in production, revalidate periodically
Heeler Recommendations
Adopt only dependencies with score ≥ 7.0
Flag dependencies below 4.0 for manual review
Set Guardrails requiring score ≥ 7.0
Last updated
Was this helpful?